Showing 1 - 18 results of 18 for search '"data protection"', query time: 0.18s Refine Results
  1. 1
  2. 2

    Impact of ICT on privacy and personal data protection in two Malaysian academic libraries by Mohd Roni, Nurul Azurah, Hassan, Basri, Mohd Napiah, Mohd Kamal

    Published 2011
    “…International Islamic University Malaysia (IIUM) and Universiti Putra Malaysia (UPM) on the issues of privacy and data protection.…”
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    A dynamic classification index to enhance data protection procedures in cloud-based environments by Moghaddam, F. F., Majd, A., Ahmadi, M., Khodadadi, T., Madadipouya, K.

    Published 2016
    “…In overall, the results show that this model has met defined demands of this research to enhance the reliability and efficiency of data protection in cloud computing environments.…”
    Conference or Workshop Item
  5. 5

    A reliable data protection model based on re-encryption concepts in cloud environments by Moghaddam, F. F., Vala, M., Ahmadi, M., Khodadadi, T., Madadipouya, K.

    Published 2016
    “…The analysis results show that this model has met defined demands of this research to enhance the reliability and efficiency of data protection in cloud computing environments.…”
    Conference or Workshop Item
  6. 6

    Personal Data Protection Act 2010: Protection of Smart Home Users’ Information in Cloud System by Basarudin, Noor Ashikin, Yeon, Asmah Laili, Mohamed Yusoff, Zuryati, Md Dahlan, Nuarrual Hilal, Mahdzir, Nazli

    Published 2016
    “…This article adopts doctrinal legal study that analyzes the Personal Data Protection Act 2010 on the aspect of protection conferred to the cloud users.The overall finding shows that there is still loopholes in the Act which need to be looked into for the purpose of improvement as well as to cater the needs of legal policy in protecting personal data of smart home users in cloud.…”
    Get full text
    Conference or Workshop Item
  7. 7

    E-commerce and data protection legal framework in Malaysia: Lessons from the experiences of the European Union and the United Kingdom by Othman, Mohd Bahrin

    Published 2006
    “…This paper is drawn from an ongoing doctoral research which is aimed at evaluating the state of global data protection legal framework from various regional and national perspectives and identifying a viable model for a comprehensive data protection law viable for Malaysia, that would enable the reconciliation of conflicting interests between the policy maker, organization and society, as well as between individual information privacy and trade interest.Examination into the Malaysian proposed Bill on Personal Data Protection, the European Union’s Directive 95/46/EC and the Data Protection Act in United Kingdom in 1998 will be made.…”
    Get full text
    Conference or Workshop Item
  8. 8

    Impact of ICT on Privacy and Personal Data Protection in Two Malaysian Academic Libraries / Nurul Azurah Mohd Roni, Mohd Kamal Mohd Napiah and Basri Hassan by Mohd Roni, Nurul Azurah, Mohd Napiah, Mohd Kamal, Hassan, Basri

    Published 2011
    “…The finding also shows that library users were aware about their privacy and personal data protection and they realize that their privacy and personal data protection were threatened.…”
    Get full text
    Conference or Workshop Item
  9. 9

    Technologies for the use of images: automated processes of identification, behavioural analysis and risk detection control at the airports by Korff, Douwe

    Published 2010
    “…This is a paper presented at an international seminar on "security, privacy & data protection", organised by the Spanish Data Protection Agency. …”
    Get full text
    Conference or Workshop Item
  10. 10

    La privacy in azienda: un modello operativo by Korff, Douwe

    Published 2002
    “…This paper, on "privacy in a business: an operational model”, was published (in Italian as "La privacy in azienda: un modello operativo" in the proceedings of the international conference on "Privacy, Cost to Resource", organised by the Italian Data Protection Authority in Rome in December 2002.…”
    Conference or Workshop Item
  11. 11

    Paper expanding on a short intervention on behalf of the European Digital Rights initiative (EDRi) by Korff, Douwe

    Published 2012
    “…The EU has decided to clarify and modernise its data protection legislation. The US is also assessing its approach to privacy. …”
    Get full text
    Conference or Workshop Item
  12. 12

    User generated content and the Muslim consumer in cyberspace by Saidin, Aznan Zuhid, Abu Bakar, Elistina

    Published 2012
    “…This situation raises some issues concerning privacy, data protection and defamation with the responsibility now being more in the hands of the consumer in exercising self-restraint. …”
    Get full text
    Conference or Workshop Item
  13. 13

    Retention of communications data: Security vs privacy by Munir, A.B.

    Published 2005
    “…Despite strong criticism by privacy experts, data protection commissioners, civil liberties groups and the ISP industry, a provision on the retention of communications data has een inserted. …”
    Get full text
    Conference or Workshop Item
  14. 14

    Light database encryption design utilizing multicore processors for mobile devices by Alomari, Mohammad Ahmed, Yusoff, Mohd Hafiz, Samsudin, Khairulmizam, Ahmad, R. Badlishah

    Published 2019
    “…This paper addresses the problem of ensuring data protection in embedded and mobile devices while maintaining suitable device performance by mitigating the impact of encryption. …”
    Get full text
    Conference or Workshop Item
  15. 15

    Secured route optimization in mobile IPv6 wireless networks in terms of data integrity by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…There is no authentication and data protection method in RO when MN moving from one network to another, in RFC 3775, standard for MIPv6. …”
    Get full text
    Conference or Workshop Item
  16. 16

    Protection of children's online privacy in Malaysia by Ayub, Zainal Amin, Mohamed Yusoff, Zuryati

    Published 2017
    “…Moreover, children are unconcern with their privacy, or do not know how to protect their informational privacy and data protection which are of concern to adults (Allen, 2001) and they are unaware the consequence and the impact of revealing their personal information, either their own data or their family data. …”
    Get full text
    Conference or Workshop Item
  17. 17

    Fault Tolerence on Binary Vote Assignment Cloud Quorum (BVACQ) Replication Technique by Noraziah, Ahmad, Ainul Azila, Che Fauzi, Fairuzullah, A., Nurzety Aqtar, Ahmad Azuan, Azlina, Zainuddin

    Published 2013
    “…Replication provides user with fast, local access to shared data, protects availability of applications and support fault tolerance because alternate data access options exist. …”
    Get full text
    Conference or Workshop Item
  18. 18

    Fault Tolerance On Binary Vote Assignment Cloud Quorum (BVACQ) Replication Technique by Noraziah, Ahmad, Abdulla Fairuzullah, Ahmad Tajuddin, Ainul Azila, Che Fauzi, Nurzety Aqtar, Ahmad Azuan, Azlina, Zainuddin, Herawan, Tutut

    Published 2013
    “…Replication provides user with fast, local access to shared data, protects availability of applications and support fault tolerance because alternate data access options exist. …”
    Get full text
    Conference or Workshop Item